A ___________ makes use of both signature and anomaly detection techniques to identify attacks.

Fill in the blank(s) with the appropriate word(s).

host-based IPS (HIPS)

Computer Science & Information Technology

You might also like to view...

Select the form control below that would be most appropriate to accept free-form comments about your website

a. select list b. text box c. scrolling text box d. None of the above

Computer Science & Information Technology

?A _____ identifies the number of pages in a website and shows how each page is linked to other pages.

A. ?wireframe B. ?prototype C. ?mockup D. ?sitemap

Computer Science & Information Technology